Insider Attack

As companies spend more and more on systems-level defenses to hacks, individuals within the organization remain the most significant point of vulnerability. With the continued increase in telework, the there are increased number of targetable points for hackers or insider breaches. To respond to these risks, some experts recommend customizing

I recently witnessed the CIO of a publicly traded company dismissing the results of a successful red team to the Board of Directors by stating that the “the test wasn’t realistic as the red team had insider access.” The “insider” access in this instance was a network connection with no